General
-
Target
f247ae6db52989c9a598c3c7fbc1ae2db54f5c65be862880e11578b8583731cb.bin
-
Size
212KB
-
Sample
201106-nz68d98cw2
-
MD5
723825ad69a5d55a1e5ed3d1ee831f0d
-
SHA1
7e082df63c3de0f8bf9d38edf72ba5268078275a
-
SHA256
f247ae6db52989c9a598c3c7fbc1ae2db54f5c65be862880e11578b8583731cb
-
SHA512
dbd1fd80c8e1224c79ecea419919df3590186c95bfd2f606d6573d759374bc54db8331478207e3b543114431c2ed8eede83b7eca74d4313e7dee16bd527c2c78
Static task
static1
Behavioral task
behavioral1
Sample
f247ae6db52989c9a598c3c7fbc1ae2db54f5c65be862880e11578b8583731cb.bin.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
f247ae6db52989c9a598c3c7fbc1ae2db54f5c65be862880e11578b8583731cb.bin.exe
Resource
win10v20201028
Malware Config
Extracted
C:\RECOVERY DATA INFORMATION.TXT
Extracted
C:\RECOVERY DATA INFORMATION.TXT
Targets
-
-
Target
f247ae6db52989c9a598c3c7fbc1ae2db54f5c65be862880e11578b8583731cb.bin
-
Size
212KB
-
MD5
723825ad69a5d55a1e5ed3d1ee831f0d
-
SHA1
7e082df63c3de0f8bf9d38edf72ba5268078275a
-
SHA256
f247ae6db52989c9a598c3c7fbc1ae2db54f5c65be862880e11578b8583731cb
-
SHA512
dbd1fd80c8e1224c79ecea419919df3590186c95bfd2f606d6573d759374bc54db8331478207e3b543114431c2ed8eede83b7eca74d4313e7dee16bd527c2c78
Score10/10-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Modifies service
-